Skip to main content

Internet security threats to discuss

In our previous articles we have discussed some of the most burning internet security threats, and as of now, we thought it would be useful to make a summary of what we are aware of on the topic. 2017 was a year of several threats in the cyber world. WannaCry, Petya/NotPetya were just two examples of it, which we were discussing earlier. As we saw, the threats that occur nowadays have become more diverse, and hackers are working hard on discovering new ways to exploit the existing online security systems.

Share this post

Comments ()

How to stay safe during online shopping

More and more people do shopping online, as it is comfortable, convenient and oftentimes it is cheaper than the other alternatives. However, when the Internet is involved, certain risks are appearing every time we use it. To shop online safely, and protect your personal identity from malicious types, we brought you some tips that should be worth considering.

Share this post

Comments ()

Why is VPN useful, and how to use it?

Today we dive into the topic of internet security again, and we are going to discuss the basics of VPN and the importance of it in business life. With the help of VPN, you can make the Internet safer, more secure and more private for yourself and your enterprise. But how does it work, and what are the most important aspects to it?

Share this post

Comments ()

Most recent hacker attacks

2017 was not a lucky year for cybersecurity. To be precise, it was one of the worst years, according to countless critical reviews. Most of the attacks were able to happen because companies do not pay enough attention to their cyber hygiene. There is a tendency of poorly protected servers and admin accounts, and this makes the job really easy for hackers. The cyberattacks highlighted the alarming vulnerability of our personal information, but which were these attacks? Today we summarised the most burning ones from the most recent period.

Share this post

Comments ()

The basics of credit card hacking

As nowadays fund transfers and online shopping are taking up a huge majority of our finances, the number of related of frauds are on the rise as well. Today we dive into the topic of credit card hacking. We will discuss vulnerabilities in credit and debit card functionality that can help hackers steal data.

Share this post

Comments ()

How bad is it to use open WIFI networks?

When the topic of using open WIFI networks comes up, the majority of the people do not mind it, however, there is that small group of professionals who would never want to use the service, and would rather just rely on their mobile internet. But how bad is the situation really? There are rumors and facts out in the public about hacking free WIFI systems and monitoring users’ activities, but how common is that present? In today’s article, we will dig a little deeper in the topic to see if there is something to fear about them in our everyday lives.

Share this post

Comments ()

Ethical hackers: how they help us

From the word “hacker” lot of people think of dark, wicked men sitting in server rooms, surrounded by high capacity computers, doing bad. Many do not know that this definition is most likely to fit crackers, who are the ones that violate systems and break into networks with malicious intent. Hackers, on the other hand, are trying to enter systems to find dangerous holes in them and share their knowledge so that those threats can be eliminated. But as the terminology is mostly mixed up nowadays, we usually use “ethical hacker” for the good guys and hackers/crackers for the bad ones.

Share this post

Comments ()

How cell phone hacking can affect you?

Cell phones, connected to e-mail and social media accounts are a sensitive area and have a major risk of being hacked. Our cell phones have access to our Dropbox, Gmail, Facebook, Twitter, Instagram accounts, and in most cases to our banking information. A hacked cell phone makes blackmailing, identity theft and losing money a great threat for the owner of the device. With some social engineering, a telephone number and some basic IT knowledge, it is an easy job to hack one’s phone. A trustworthy but otherwise fake site that is convincingly copying a service you use is enough to get the sensitive information they need for a successful hacking.

Share this post

Comments ()